Implementasi XOR Guna Peningkatan Enkripsi Teks Menggunakan Rotasi Multi Kubus

Authors

DOI:

https://doi.org/10.62411/tc.v23i1.9531

Keywords:

rotasi kubus, multi kubus, XOR

Abstract

Meluasnya penggunaan internet semakin memudahkan seseorang untuk mendapatkan informasi. Kemudahan akses ini membuka peluang perilaku illegal dalam memperoleh dan atau penyebaran informasi. Karenanya pengamanan informasi menjadi faktor krusial saat ini. Dalam penelitian ini operasi XOR menggunakan bilangan acak digunakan untuk meningkatkan hasil enkripsi teks menggunakan rotasi multi kubus. Hasil pengujian menunjukkan terjadi peningkatan yang signifikan. Nilai korelasi meningkat sebesar 82%, Nilai MAE meningkat sebesar 77% dan nilai AE meningkat sebesar 44%. Peningkatan ini menunjukkan penggunaan XOR pada rotasi multi kubus mampu memenuhi kriteria difusi dan konfusi sebagai karakteristik kriptografi yang baik.

Author Biographies

Rihartanto Rihartanto, Politeknik Negeri Samarinda

Jurusan Teknologi Informasi

Didi Susilo Budi Utomo, Politeknik Negeri Samarinda

Jurusan Teknologi Informasi

Ansar Rizal, Politeknik Negeri Samarinda

Jurusan Teknologi Informasi

References

S. A. Hannan and A. M. A. M. Asif, “Analysis of Polyalphabetic Transposition Cipher Techniques used for Encryption and Decryption,” Int. J. Comput. Sci. Softw. Eng., vol. 6, no. 2, pp. 41–46, 2017.

H. Delfs and H. Knenbl, Introduction to Cryptography: Principles and Application, Third Edit. Berlin: Springer-Verlag GmbH, 2015. doi: 10.1007/978-3-662-47974-2.

R. Dixit and K. Ravindranath, “Encryption techniques & access control models for data security : A survey,” Int. J. Eng. Technol., vol. 7, no. 1.5, pp. 107–110, 2018, doi: 10.14419/ijet.v7i1.5.9130.

B. Schneier, Applied Crypthography, 20th Anniv. Indianapolis: John Wiley & Sons, Inc, 2015.

W. Stallings, Cryptography and Network Security: Principles and Practice, Seventh Ed. Harlow: Pearson Education Limited, 2017.

C. Paar and J. Pelzl, Understanding Cryptography. Berlin: Springer-Verlag, 2010. doi: 10.1007/978-3-642-04101-3.

M. B. Pramanik, “Implementation of Cryptography Technique using Columnar Transposition,” Int. J. Comput. Appl., pp. 19–23, 2014.

B. Bjorkman and R. Talbert, “Fixed Points of Columnar Transpositions,” J. Discret. Math. Sci. Cryptogr., vol. 18, no. 5, pp. 541–557, Sep. 2015, doi: 10.1080/09720529.2014.986910.

S. Majumdar, A. Maiti, B. Bhattacharyya, and A. Nath, “A New Bit-level Columnar Transposition Encryption Algorithm,” Int. J. Adv. Res. Comput. Sci. Manag. Stud., vol. 3, no. 7, pp. 176–184, 2015, [Online]. Available: http://www.ijarcsms.com/July2015.htm

N. Sinha and K. Bhamidipati, “Improving Security of Vigenère Cipher by Double Columnar Transposition,” Int. J. Comput. Appl., vol. 100, no. 14, pp. 6–10, 2014, doi: 10.5120/17591-8290.

M. Annalakshmi and A. Padmapriya, “Zigzag Ciphers : A Novel Transposition Method,” in International Conference on Computing and information Technology (IC2IT-2013), 2013, pp. 8–12.

O. P. Baghel, “Combination of Transposition and Alpha-Numeric Vigenere Table for Secure Communication,” J. Netw. Commun. Emerg. Technol., vol. 7, no. 4, pp. 15–17, 2017.

A. Rizal, D. Susilo Budi Utomo, R. Rihartanto, and A. Susanto, “Encryption of RGB Image Using Hybrid Transposition,” in Advances in Social Science, Education and Humanities Research, 2019, vol. 203, no. ICLICK 2018, pp. 57–61. doi: 10.2991/iclick-18.2019.13.

A. Jawahir and H. Haviluddin, “An audio encryption using transposition method,” Int. J. Adv. Intell. Informatics, vol. 1, no. 2, p. 98, Jul. 2015, doi: 10.26555/ijain.v1i2.24.

X. Feng, X. Tian, and S. Xia, “A novel image encryption algorithm based on fractional Fourier transform and magic cube rotation,” Proc. - 4th Int. Congr. Image Signal Process. CISP 2011, vol. 2, no. 5, pp. 1008–1011, 2011, doi: 10.1109/CISP.2011.6100319.

X. Feng, X. Tian, and S. Xia, “An improved image scrambling algorithm based on magic cube rotation and chaotic sequences,” Proc. - 4th Int. Congr. Image Signal Process. CISP 2011, vol. 2, pp. 1021–1024, 2011, doi: 10.1109/CISP.2011.6100274.

L. Zhang, X. TiaN, and S. Xia, “Scrambling algorithm of image encryption based on Rubik’s cube rotation and logistic sequence,” Proc. - 2011 Int. Conf. Multimed. Signal Process. C. 2011, vol. 1, pp. 312–315, 2011, doi: 10.1109/CMSP.2011.69.

K. Loukhaoukha, J. Chouinard, and A. Berdai, “A Secure Image Encryption Algorithm Based on Rubik ’ s Cube Principle,” J. Electr. Comput. Eng., vol. 2012, 2012, doi: 10.1155/2012/173931.

P. Praveenkumar et al., “Rubik’s Cube Blend with Logistic Map on RGB: A Way for Image Encryption,” Reasearch J. Inf. Technol., vol. 6, no. 3, pp. 207–215, 2557, doi: 10.3923/rjit.2014.207.215.

F. Twum, J. B., and M.-D. William, “A Proposed Enhanced Transposition Cipher Algorithm based on Rubik’s Cube Transformations,” Int. J. Comput. Appl., vol. 182, no. 35, pp. 18–26, 2019, doi: 10.5120/ijca2019918323.

D. Rajavel and S. P. Shantharajah, “Cubical key generation and encryption algorithm based on hybrid cube’s rotation,” Int. Conf. Pattern Recognition, Informatics Med. Eng. PRIME 2012, pp. 183–187, 2012, doi: 10.1109/ICPRIME.2012.6208340.

Rihartanto, D. S. B. Utomo, H. Februariyanti, A. Susanto, and W. Khafidhah, “Bit-based cube rotation for text encryption,” Int. J. Electr. Comput. Eng., vol. 13, no. 1, pp. 709–717, 2023, doi: 10.11591/ijece.v13i1.pp709-717.

R. Rihartanto, R. K. Ningsih, A. F. O. Gaffar, and D. S. B. Utomo, “Implementation of vigenere cipher 128 and square rotation in securing text messages,” J. Teknol. dan Sist. Komput., vol. 8, no. 3, pp. 201–209, 2020, doi: 10.14710/jtsiskom.2020.13476.

H. V. Gamido, “Implementation of a bit permutation-based advanced encryption standard for securing text and image files,” Indones. J. Electr. Eng. Comput. Sci., vol. 19, no. 3, pp. 1596–1601, 2020, doi: 10.11591/ijeecs.v19.i3.pp1596-1601.

S. D. Mohammed and T. M. Hasan, “Cryptosystems using an improving hiding technique based on latin square and magic square,” Indones. J. Electr. Eng. Comput. Sci., vol. 20, no. 1, pp. 510–520, 2020, doi: 10.11591/ijeecs.v20.i1.pp510-520.

J. N. B. Salameh, “A new symmetric-key block ciphering algorithm,” Middle East J. Sci. Res., vol. 12, no. 5, pp. 662–673, 2012, doi: 10.5829/idosi.mejsr.2012.12.5.1685.

H. Noura, L. Sleem, M. Noura, M. M. Mansour, A. Chehab, and R. Couturier, “A new efficient lightweight and secure image cipher scheme,” Multimed. Tools Appl., vol. 77, no. 12, pp. 15457–15484, 2018, doi: 10.1007/s11042-017-5124-9.

Downloads

Published

2024-06-21